General

  • Target

    0c6877f83f7b5ae6c98e4768e79fc7e5b7f3070c353e7359b1fa5c2ee201e9acN

  • Size

    6.7MB

  • Sample

    240927-y4xvfazeqg

  • MD5

    3bd4f1646b4a06061c1852b56e5653a0

  • SHA1

    6757017284048b68088649c9ad751b1c0f39fe13

  • SHA256

    0c6877f83f7b5ae6c98e4768e79fc7e5b7f3070c353e7359b1fa5c2ee201e9ac

  • SHA512

    cefa45d74b4f2a2d4b693495faa47a9e68e1e34aa8bcb3d6a1a7a831eeafc58a0ad667bd46ab7b73863ee10b1efab16cf52feaf260083b3b01d52caf9208e748

  • SSDEEP

    196608:BCumWGv2dOjmFwDRxtYSHdK34kdai7bN3m5SE+3EAKN2KH:/G+IK2pM9B3QQiAKz

Malware Config

Targets

    • Target

      0c6877f83f7b5ae6c98e4768e79fc7e5b7f3070c353e7359b1fa5c2ee201e9acN

    • Size

      6.7MB

    • MD5

      3bd4f1646b4a06061c1852b56e5653a0

    • SHA1

      6757017284048b68088649c9ad751b1c0f39fe13

    • SHA256

      0c6877f83f7b5ae6c98e4768e79fc7e5b7f3070c353e7359b1fa5c2ee201e9ac

    • SHA512

      cefa45d74b4f2a2d4b693495faa47a9e68e1e34aa8bcb3d6a1a7a831eeafc58a0ad667bd46ab7b73863ee10b1efab16cf52feaf260083b3b01d52caf9208e748

    • SSDEEP

      196608:BCumWGv2dOjmFwDRxtYSHdK34kdai7bN3m5SE+3EAKN2KH:/G+IK2pM9B3QQiAKz

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks